Resubmissions

30-05-2023 11:59

230530-n52jxahg2s 10

30-05-2023 09:23

230530-lcsp7aha5z 10

General

  • Target

    e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.zip

  • Size

    474KB

  • Sample

    230530-lcsp7aha5z

  • MD5

    7f9adcb688c6cf5c1910a6a8bc5cee14

  • SHA1

    c598ca1d1556b9691b4096b865662fba03ad0fdb

  • SHA256

    a77e709b70ec46539ce939b203e698593d36c1db045c878f86aeecdd37286830

  • SHA512

    bd7f47c700cf8584b59e20f977769abd689cacd3855c55c072cdf77743f4ff559a0a678a18a8e3a75d95e3f523ef3fbe0f25f7e813d8a9655193dc7845912674

  • SSDEEP

    12288:QAW4BzIwKJzbjoTUmZVa+sMn7dBcR9DZecLRyo56zxj79:RW4Z5mzbjyXPa+r7dUx3LRst79

Malware Config

Extracted

Family

limerat

Wallets

1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/4pByu6u5

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Targets

    • Target

      e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.exe

    • Size

      781KB

    • MD5

      5ddfbddf74d9e09bf434940362019979

    • SHA1

      595d69d9fc35b83cd8d6567e88ab6526582576e4

    • SHA256

      e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c

    • SHA512

      6fcf4f5c573986cf5ae881812bf692a4d76683d636e4a7211111fc37f11e7ac8998dc98177b3efbbbf36ffd61346fa0aa5853231ee8337816ab7585ee4b9b693

    • SSDEEP

      12288:fClBbX5Ty5syL0CR8gotz/S31L/5C9RJl7ICfLcpy:faUxLPigotulL/I9RACfLco

    • Detect Neshta payload

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks